The functionality of your Palm handheld can be extended by turning it into an authentication key on which encryption passwords
and user profiles are stored. You will be able to use your Palm to protect access to your computer and use it instead of typing
the passwords. You will also enjoy the safety of having all your important documents on it - all protected by strong 256-bit
AES encryption.

You can easily do this by using a smart combination of Dekart and Softick software.

It will take you only a few minutes to learn how to make your Palm an all-in-one solution - a handheld, a security token and an
encrypted disk. We hope this guide will help you increase the value of your Palm - by making it a secure and efficient solution for
protecting your private data.

Why?

By mounting your flash memory card (or internal memory) to your desktop PC, you can store your encrypted files on it. You will be
able to decrypt your files on any computer to which your Palm can be connected.

The major advantage is that your Palm is not only your Portable Digital Assistant, but also your own Portable Encrypted Storage
Device or Portable Encrypted Disk.

It is also your Personal Security Key. You will be able to log on to a Windows domain or your laptop by simply connecting your
Palm to the computer. Additionally, you can use it to log on to a terminal server, Citrix servers or Lotus Notes, etc.

Cost-effectiveness - you will not have to buy any additional hardware.

A steep learning curve - you can keep using the PDA in a usual manner, without having to change your habits or adapt to
new software.

Privacy - you can be sure that your data is safe, because it is always in your pocket.

100% secure - due to the fact that every single bit of your files is encrypted with the strongest encryption algorithm
available today, the data is not accessible even if you lose the flash memory card or your Palm is stolen.

With these facts in mind, it is clear why the common approach to the security of your data would not be appropriate for you:

A usual password is not safe. It can be easily detected by keyloggers and spyware;
it can be brute-forced, or even guessed!

You can write it down on a piece of paper, someone can read it.

You can make errors when typing it, so it will take you more attempts to fill it in, hence someone has more chances to
see the keys you're pressing.

Usually people use the same password for all their accounts in order to not forget it.
A single flaw, and all your privacy is vanished; while storing the passwords on the PDA will save you from all the trouble.

It is a common practice to use a smart card for secure authentication. However, smart cards and biometric devices are quite
expensive equipment. As you already own a handheld device, you can easily save a fortune by using it
with the same efficiency as the smart card.

Most of the Palm owners get so attached to their devices that eventually the PDA becomes a part of them. In this case,
this is probably the most private solution from all the private solutions you could possibly ask for!

Mixing the components

One of the most important features of the applications we are about to use is their transparency. This means that you are able
to combine these programs with any kind of software, without having to worry about potential compatibility issues.

The next important aspect is based on their distinctive features: unrestricted mobility, and enhanced security.

This is the most popular scenario. If you have a PDA with a flash memory card (either SD or MMC), you can store the key-file on the
Palm. As a result, you will not have to enter a password when logging in; all you have to do is set the handheld in the cradle and
connect it to the desktop via Softick Card Export II. Dekart Logon will automatically detect it and log you in.

For a more secure authentication, you can set a PIN code, which will be used to encrypt the key-file on the handheld. In this case,
nobody will be able to log in, even if the PDA was stolen, or someone duplicated the contents of the flash memory card. Read this guide
to learn how to choose a strong PIN code.

To accomplish this, follow these steps:

On the PDA

Install Softick Card Export II.

Configure the application.

Run Softick Card Export II and press "Connect to desktop".

On the desktop

Install Dekart Logon.

Make sure that the Palm is connected to the desktop.

Create a new profile and store it on the virtual disk that appears in the list.

Optionally, you can set a PIN code to the profile.

Optionally, you can enable the "Allow logon only with key" feature, to maximize the security level.

If you have a PDA but no flash memory card, you can emulate one by using the free space of your Palm's internal memory.
In this case, you will not need any external cards - all you need is the PDA itself.

As in the previous situation, you should encrypt the key file so that your security is not compromised even if the handheld
gets stolen or lost.

To accomplish this, follow these steps:

On the PDA

Install RAM Drive.

Create a new virtual volume.

Format the volume.

Install Softick Card Export II.

Configure the application by selecting the virtual volume you have previously created with RAM Drive.

Press "Connect to desktop".

On the desktop

Install Dekart Logon.

Make sure that the Palm is connected to the desktop.

Create a new profile and store it on the virtual disk that appears in the list.

Optionally, you can set a PIN code to the profile.

Optionally, you can enable the "Allow logon only with key" feature, to maximize the security level.

Note: in both cases you can use any program from the Dekart Logon series, not only the version for
Windows authentication. You can choose between Logon for Lotus Notes, Terminal Logon, Logon for Citrix ICA Client.

Note: you can use all these products simultaneously and use the same Palm to logon to Windows,
terminal servers and Citrix servers with the same convenience and security.

If you are a power-user who seeks maximum security, you can use the PDA as a second or third authentication factor when
decrypting your files; i.e. it is used as a key, along with biometric authentication and a usual password.

To accomplish this, follow these steps:

On the PDA

Install Softick Card Export II.

Configure the application.

Run Softick Card Export II and press "Connect to desktop".

On the desktop

Install Private Disk Multifactor.

Create a new virtual encrypted image.

Store your profile on the drive you mounted at step #3 of the previous list. Note that you can move the encrypted image on the
PDA itself.

My Palm is my everything

You can use the programs described above together. In other words, the PDA can be a security key and an encrypted disk at
the same time. None of the applications will conflict with each other.

The ingredients

Depending on what you intend to do; you will have to install the required applications. Consult these manuals to find
out how to install each application:

Where can I get a list of supported devices?The list can be found in the Softick Card Export II installation manual.

How to disconnect the drive from the computer?You should use the "disconnect removable device" feature by clicking the icon in the system tray.
Afterwards, press 'disconnect' on your Palm.

Is it wrong not to use 'safe hardware removal' even if Softick Card Export II tells me
that there are no read/write operations currently in progress?In Windows XP you can remove it right away, because this OS is optimizes the external devices for 'quick removal'.
If this setting is changed, or you have a different OS, we suggest you use 'safe hardware removal'.

Why doesn't it connect if I use the infra-red interface?Softick Card Export II will only allow you to mount the card to the desktop if you use the cradle.

How can I get it to work in Windows 98?Use the supplied driver, it is located in Softick Card Export II distributive.

My PDA is not in the supported devices list. What can I do in order to help
you extend the compatibility of your software?Fill Softick Support request form

Dekart products related

My PDA is not in the supported devices list. Where can I find more information about your software?Check these pages:

What other software can I combine with the products described in this guide?As we stated earlier, you can apply virtually any software that involves encryption, authentication, external memory cards,
or Palm handhelds. For a start, you should take a look at these: